SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

IMPORTANCE OF COHERENCE PROTOCOLS WITH NETWORK APPLICATIONS
ON MULTICORE PROCESSORS

ABSTRACT:

As Internet and information technology have continued developing, the necessity for fast packet
processing in computer networks has also grown in importance. All emerging network
applications require deep packet classification as well as security-related processing and they
should be run at line rates. Hence, network speed and the complexity of network applications
will continue increasing and future network processors should simultaneously meet two
requirements: high performance and high programmability. We will show that the performance
of single processors will not be sufficient to support future demands. Instead, we will have to
turn to multicore processors, which can exploit the parallelism in network workloads.

In this paper, we focus on the cache coherence protocols which are central to the design of
multicore-based network processors. We investigate the effects of two main categories of various
cache coherence protocols with several network workloads on multicore processors. Our
simulation results show that token protocols have a significantly higher performance than
directory protocols. With an 8-core configuration, token protocols improves the performance
compared to directory protocols by a factor of nearly 4 on average.

More Related Content

Viewers also liked

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecwayprojects
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...ecwayprojects
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsecwayprojects
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingecwayprojects
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...ecwayprojects
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...ecwayprojects
 
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 a
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 aข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 a
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 akruwaeo
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryecwayprojects
 
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 c
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 cข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 c
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 ckruwaeo
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...ecwayprojects
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...ecwayprojects
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 

Viewers also liked (15)

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
 
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 a
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 aข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 a
ข้อสอบ O-net ปี 2553 สังคม อังกฤษ คณิต 62 a
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
My life Goals
My life GoalsMy life Goals
My life Goals
 
Poster
PosterPoster
Poster
 
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 c
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 cข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 c
ข้อสอบ O-Net ปี 2553 ไทย วิทย์ สุขศึกษา ศิลปะ การงาน 91 c
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 

Similar to Importance of coherence protocols with network applications on multicore processors

Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...ecway
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...Ecway Technologies
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...ecwayerode
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Ecway Technologies
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technologyRanol R C
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewtRanol R C
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksEcwayt
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networksEcwaytech
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksEcwaytech
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksecwayprojects
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networksEcwayt
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performancecsandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...cscpconf
 

Similar to Importance of coherence protocols with network applications on multicore processors (20)

Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
50120140505006
5012014050500650120140505006
50120140505006
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
 
82 87
82 8782 87
82 87
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
cv2
cv2cv2
cv2
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 

More from ecwayprojects

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...ecwayprojects
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecwayprojects
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 
Distributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodDistributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodecwayprojects
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...ecwayprojects
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksecwayprojects
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecwayprojects
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...ecwayprojects
 
Cross layer design of congestion control and power control in fast-fading wir...
Cross layer design of congestion control and power control in fast-fading wir...Cross layer design of congestion control and power control in fast-fading wir...
Cross layer design of congestion control and power control in fast-fading wir...ecwayprojects
 
Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsecwayprojects
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksecwayprojects
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...ecwayprojects
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsecwayprojects
 

More from ecwayprojects (18)

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processor
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Distributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands methodDistributed web systems performance forecasting using turning bands method
Distributed web systems performance forecasting using turning bands method
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
 
Cross layer design of congestion control and power control in fast-fading wir...
Cross layer design of congestion control and power control in fast-fading wir...Cross layer design of congestion control and power control in fast-fading wir...
Cross layer design of congestion control and power control in fast-fading wir...
 
Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 

Importance of coherence protocols with network applications on multicore processors

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com IMPORTANCE OF COHERENCE PROTOCOLS WITH NETWORK APPLICATIONS ON MULTICORE PROCESSORS ABSTRACT: As Internet and information technology have continued developing, the necessity for fast packet processing in computer networks has also grown in importance. All emerging network applications require deep packet classification as well as security-related processing and they should be run at line rates. Hence, network speed and the complexity of network applications will continue increasing and future network processors should simultaneously meet two requirements: high performance and high programmability. We will show that the performance of single processors will not be sufficient to support future demands. Instead, we will have to turn to multicore processors, which can exploit the parallelism in network workloads. In this paper, we focus on the cache coherence protocols which are central to the design of multicore-based network processors. We investigate the effects of two main categories of various cache coherence protocols with several network workloads on multicore processors. Our simulation results show that token protocols have a significantly higher performance than directory protocols. With an 8-core configuration, token protocols improves the performance compared to directory protocols by a factor of nearly 4 on average.